Pindrop® Pulse, First to Accurately Detect Deepfakes from OpenAI’s Voice Engine
Several of our customers have asked Pindrop if our recently launched deepfake detection product, Pindrop® Pulse, can detect synthetic content generated by OpenAI’s1 new Voice
4 Top Cybersecurity Trends Discovered From Our Recent CFX Event
Ensuring cybersecurity is front and center for companies is now a non-negotiable task. That’s why Pindrop released quarterly insider sessions to check in and ensure
Pindrop Named A Winner in the FTC Voice Cloning Challenge
The FTC (Federal Trade Commission) held its sixth Voice Cloning Challenge under the America COMPETES Act to drive innovation in voice cloning detection for protection
View by category
Popular Blogs
On the Wire Podcast: Nick Sullivan
There is an effort underway by some of the larger Internet infrastructure companies to encrypt as much of the network as possible. Google has been
500 Million Users Affected by Yahoo Data Breach
Yahoo today confirmed that state-sponsored attackers compromised the company’s network in 2014, stealing data belonging to 500 million users. The stolen data includes names, email
No Surprise Google is Storing Allo Messages
The launch of Google Allo came with a big surprise. The surprise isn’t that Allo stores users’ messages indefinitely by default, the surprise is that people were
As Attacks Continue, SWIFT Looks For New Ways to Fight Fraud
SWIFT, the payment network that supports financial institutions and banks around the world, continues to see attacks compromising its customers’ networks as attackers look for new
Nearly All Top Global Companies Have Leaked Credentials Online
Many CSOs live in fear of waking up to an email reporting a data breach at their company, but the threat to an enterprise isn’t
macOS Sierra Release Fixes Dozens of Security Flaws
Apple has fixed nearly 20 code-execution vulnerabilities in macOs, including a number that could allow an attacker to run code with kernel privileges. The patches
‘The Horse is Out of the Barn’ on Government Control of Encryption
Controlling the development and deployment of strong encryption may have once been a possibility for intelligence and law enforcement agencies, but those days have passed
Hackers Activate Tesla’s Brakes From Miles Away
The amount of technology packed into modern cars is kind of amazing. Just a few years ago, the most advanced thing in most vehicles was
Fighting Account Takeover Attacks With AuthTables
The goal of many attackers is taking over a target account. That can be the account of an admin at a large enterprise, the bank
Experts Question Legality of Government Hacking
The emergence into the public consciousness of government hacking techniques and activities in recent years has sparked an increasingly loud debate over how and when law